History, in the beginning, there was a need for urgent care intelligence gathering and the best way was consisted of sending out agents to observe and keep record of what they saw which was then sent to a supervisor then they pass it on to a clerk who compiled and filed into a filing cabinet then any information required had to be retrieved from the filing cabinet

When computers became accesilbe to the public along the way they replace the filing cabinet with data storage and again "the cloud" was offered for free/low cost and data handeed on a platter not much changed there and now just quicker now days.

example: the first use of computers intelligence gathering was in the Second World War by the British Secret Service codename Ultra using a computer Colossus which broke the German and Japenese Communications which helped the west to win that war

But when the internet came online for the masses so the need for agents to send out agents to observe and the need for staff was reduced initially, an algorithm to replace the pool of human resources which became small due to government cost

When Western manufacturers or services decided to outsource the Manufacture/Service they gave away a means of source information by several means more about that here.

But when the internet came online for the masses so the need for agents to send out agents to observe and the need for staff was reduced iniatally

When Western manufacturers or services decided to outsource the Manufacture/Service they gave away a means of source information by several means more about that here.

When Western manufacturers decided to outsource the manufacturer of equipment among them Dell, Lenovo and Hewlett-Packard to China to escape their local labour costs in the short terms belief of maxi um profits and greed and to hell with their base countries infrastructure and their government tax coffers. In return China kept the manufacture intellect and officially now they demanded that official trapdoors are installed into new pc's link here they West gave away a means of source information by several means more about that here link however the same technology of backdoors has been around for a while see guess whose computers were being used for in Research £ Development and the process, a massive instinctual theft of drugs, baby milk, cars, military etc. the wake up call has to start it is thus imperative that companies and governments,hello... In the end, this only stop when profits are not the important issue and realise they have been a losing war for years down to Corporate Greed

Israel:

The USA allowed the telecommunications billing of their phone networks by doing so they "Israelis" went on a campaign of compromising leading individuals in the US who were having affairs with people they shouldn't they also they built the surveillance equipment for USA security agencies which came to light when law agencies were running operations and when it came time to arrest people involved in illegal activities that all the Israeli agents were disappearing before they had the chance to arrest them, then it became clear that Israelites really had a backdoor into the equipment

By the way, that means the rest of the world Intelligence Intel discussed by leakage as well.Good One USA...

At this time algorithms were also being developed and that allowed for the replacement of agents supervisors and clerks altogether and now freely availalbe today from private actors eg www.inspectlet.com a good clue is any web address with s in the web address https://www.anydomain.com/

but when intelligence gathering agencies, actors couldn't find out enough about individuals so easily that is when Facebook, Amazon, Google and others came into use and that is when it really took off no need for anybody to be involved in the process especially when you consider the use of facial and behavioural recognition software is used to disseminate raw information, how, why. when and whom became a breeze

Actors state and private are closely linked

which over time become blurred to the extent that they overlap and now even if you not listed you become known by those who are. In the end, just take care when you are online

State financing private actors

Example... CIA

From startups to standing on its own two feet Tech companies and the CIA has a history which is quite documented and an easily searchable online, now they use now a company called in-q-tel a reference to the James Bond movies " Q". other foreign state actors have been infiltrating the infrastructure of most countries for years, worth looking around and checking.

Eg: Facebook, have you ever been to Facebook? and now Facebook certainly been exposed now that the "Privacy for Advertising" model was a deception but recently the data that was you were given freely to both sides of the political spectrum in the USA during the election phase and you can see how the data was used to subvert elections and referendums, etc, the thought of big brother is true and the wake-up call to take stock is now and if you are a user, your data is copyrighted and there is very strong ownership of that data and as Facebook has 100% ownership of it, I do know of steps to take the value of that data and reduce it to zero more later Facebook is now trying to recover its public image we will see...